3,040 research outputs found

    Secure Mechanism For Wireless Sensor Networks - A Review

    Get PDF
    Wireless Sensor Network (WSN) is an emerging technology that is very usefu l for various futuristic applications both for public and military. As the use of wireless sensor networks continue to grow, so it should require effective security mechanisms. So to ensure the security of communication and data access control in WSN is paramount importance. Because sensor networks may interact with sensitive data and operate in hostile unattended environments, it is important that these security concerns should be addressed from the beginning of the system design. However because of inh erent resource and computing constraints, security in sensor networks poses different challenges than traditional network security. There is currently enormous research is present in the field of wireless sensor network security. Thus, familiarity with t he wireless sensor network,attack on WSN and security systems design for WSN will benefit researchers greatly. With this in mind , I survey the major topics in wireless sensor network security, and presentmany of the current attacks, and finally list their corresponding defensive measure

    Framework of trusted wireless sensor node platform for Wireless Sensor Network / Yusnani Mohd Yussoff

    Get PDF
    Wireless Sensor Networks (WSNs) have shown great promise as the emerging technology for data gathering from unattended or hostile environment. The advancement in micro-electro-mechanical sensor technology, wireless communication technology and the recent scavenging energy have gradually expanding the acceptance of WSN related applications. The design of sensors that are small, low cost, low power and combined with its unattended nature has made it more viable and indirectly promotes its popularity for future solutions in various real-life challenges. One of the most challenging yet important security issues in Wireless Sensor Network is in establishing trusted and secured communication between sensor node and base station. While the term trusted has been widely used referring to valid nodes in the group, this thesis refer the term trusted based on Trusted Computing Group (TCG) specifications. With limitations in the present solutions such as late discovery of invalid nodes such in Trust Management System and high energy consumption with external security chip due to the used of Trusted Platform Module chip; a Framework of a Trusted Wireless Sensor Node is presented

    Intrusion-Resilient Integrity in Data-Centric Unattended WSNs

    Get PDF
    Unattended Wireless Sensor Networks (UWSNs) operate in autonomous or disconnected mode: sensed data is collected periodically by an itinerant sink. Between successive sink visits, sensor-collected data is subject to some unique vulnerabilities. In particular, while the network is unattended, a mobile adversary (capable of subverting up to a fraction of sensors at a time) can migrate between compromised sets of sensors and inject fraudulent data. In this paper, we provide two collaborative authentication techniques that allow an UWSN to maintain integrity and authenticity of sensor data-in the presence of a mobile adversary-until the next sink visit. Proposed schemes use simple, standard, and inexpensive symmetric cryptographic primitives, coupled with key evolution and few message exchanges. We study their security and effectiveness, both analytically and via simulations. We also assess their robustness and show how to achieve the desired trade-off between performance and security

    A Secured Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography

    Get PDF
    User authentication is a crucial service in wireless sensor networks (WSNs) that is becoming increasingly common in WSNs because wireless sensor nodes are typically deployed in an unattended environment, leaving them open to possible hostile network attack. Because wireless sensor nodes are limited in computing power, data storage and communication capabilities, any user authentication protocol must be designed to operate efficiently in a resource constrained environment. In this paper, we review several proposed WSN user authentication protocols, with a detailed review of the M.L Das protocol and a cryptanalysis of Das’ protocol that shows several security weaknesses. Furthermore, this paper proposes an ECC-based user authentication protocol that resolves these weaknesses. According to our analysis of security of the ECC-based protocol, it is suitable for applications with higher security requirements. Finally, we present a comparison of security, computation, and communication costs and performances for the proposed protocols. The ECC-based protocol is shown to be suitable for higher security WSNs

    Survey and Systematization of Secure Device Pairing

    Full text link
    Secure Device Pairing (SDP) schemes have been developed to facilitate secure communications among smart devices, both personal mobile devices and Internet of Things (IoT) devices. Comparison and assessment of SDP schemes is troublesome, because each scheme makes different assumptions about out-of-band channels and adversary models, and are driven by their particular use-cases. A conceptual model that facilitates meaningful comparison among SDP schemes is missing. We provide such a model. In this article, we survey and analyze a wide range of SDP schemes that are described in the literature, including a number that have been adopted as standards. A system model and consistent terminology for SDP schemes are built on the foundation of this survey, which are then used to classify existing SDP schemes into a taxonomy that, for the first time, enables their meaningful comparison and analysis.The existing SDP schemes are analyzed using this model, revealing common systemic security weaknesses among the surveyed SDP schemes that should become priority areas for future SDP research, such as improving the integration of privacy requirements into the design of SDP schemes. Our results allow SDP scheme designers to create schemes that are more easily comparable with one another, and to assist the prevention of persisting the weaknesses common to the current generation of SDP schemes.Comment: 34 pages, 5 figures, 3 tables, accepted at IEEE Communications Surveys & Tutorials 2017 (Volume: PP, Issue: 99

    SECURED DATA AGGREGATION METHODS IN WIRELESS SENSOR NETWORKS USING HOMOMORPHIC OPERATION - A REVIEW

    Get PDF
    Wireless sensor networks are energy constrained. Data aggregation is an important mechanism for achieving energy efficiency in such networks. The aggregation reduces redundancy in data transmission which results in improved energy usage. Several security issues are there in data aggregation, which includes data confidentiality, data integrity, availability, and freshness. Such issues become complex since WSN is deployed in hostile and unattended environment. So the sensor nodes may fail and compromised by adversaries. Secured data aggregation in sensor network is a topic of research.  Many solutions are proposed for secured data aggregation, using different encryption methods. Homomorphic encryption is one of such technique. In homomorphic encryption, all the nodes participate in the aggregation. Here, nodes can't see any intermediate or final result but the aggregation is efficient. In this paper, secured data aggregation methods are classified and the performance is compared in terms of integrity and confidentiality

    ANALYSES of ATTACKS AND SECURITY MECHANISM IN WIRELESS SENSOR NETWORKS

    Get PDF
    Wireless Sensor Networks (WSNs) are regularly self-forming, Self-healing networks that interact with very sensitive data and deployed in hostile unattended environments, where the security issues should be focused to attain their potential.Due to this various facts the existing security algorithms are not suitable for current applications. This causes the research to suggest the novel security mechanisms appropriate to WSN which contains minimum resource consumption and maximum security. This paper lights a torch on security of WSN discusses typical constraints, security goals, and different attacks in it and their defensive techniques

    A Framework for Secure and Survivable Wireless Sensor Networks

    Get PDF
    Wireless sensor networks increasingly become viable solutions to many challenging problems and will successively be deployed in many areas in the future. A wireless sensor network (WSN) is vulnerable to security attacks due to the insecure communication channels, limited computational and communication capabilities and unattended nature of sensor node devices, limited energy resources and memory. Security and survivability of these systems are receiving increasing attention, particularly critical infrastructure protection. So we need to design a framework that provide both security and survivability for WSNs. To meet this goals, we propose a framework for secure and survivable WSNs and we present a key management scheme as a case study to prevent the sensor networks being compromised by an adversary. This paper also considers survivability strategies for the sensor network against a variety of threats that can lead to the failure of the base station, which represents a central point of failure.key management scheme, security, survivability, WSN
    • 

    corecore